Showing posts with label COMPUTER (IT) EXAM PAPER. Show all posts
Showing posts with label COMPUTER (IT) EXAM PAPER. Show all posts

Wednesday, March 7, 2012

Bank IT Officer (Specialist Oficer ) - Computer Awarenes Exam Paper

Latest Updated Exam / Guess Papers - http://syllabus123.blogspot.com/
Bank IT Officer (Specialist Oficer ) - Computer Awarenes Exam Paper


Following are the questions and correct answers of those questions:

1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
(a) entity integrity rule

2. An applet __________
(c) is a compiled program that usually runs on the client

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(e) None of these

4. Which error detection method uses one’s complement arithmetic?
(b) Checksum

5. A result of a computer virus can not lead to ___.
(b) Mother Board Crash

6. The network interface card of LAN is related to following layer of OSI Model-
(e) All of these

7. Which of the following does not describe a data warehouse?
(d) Updateable

8. Which of the following is true ?
(a) Logical design is software-dependent

9. A range check _____
(c) determines whether a number is within a specified limit

10. The total set of interlinked hypertext documents worldwide is-
(c) WWW

11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(b) hides, the details of an object from

12. Every computer connected to an intranet or extranet must have a distinct_____
(c) IP address

13. A table of bits in which each row represents the distinct values of a key?
(b) Bitmap index

14. The degree of detail that should be incorporated into a database depends on what?
(b) The type of database

15. The ___ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

16. Before a package can be used in a java program it must be___.
(c) imported

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.
(b) begin the line with double slashes (/ /)

18. Programming language built into user programs such as Word and Excel are known as____
(c) object-oriented languages

19. Firewalls are used to protect against___.
(a) Unauthorized Attacks

20. This is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user-
(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are__.
(d) Schema, Table and View

22. Data are ________ in client/server computing.
(c) sent only upon the client’s request

23. Which of the following will not eliminates the ambiguities of a null value?
(d) Define supertypes

24. The____directory is mandatory for every disk.
(a) Root

25. This is a group of servers that share work and may be able to back each other up if one server fails.
(b) Cluster

Bank IT Officer (Specialist Oficer ) - Computer Awarenes Exam Paper

Latest Updated Exam / Guess Papers - http://syllabus123.blogspot.com/
Bank IT Officer (Specialist Oficer ) - Computer Awarenes Exam Paper


1. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these






2. An applet ________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these


3. A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

5. A result of a computer virus can NOT lead to ________ .

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model

(a) Transport

(b) Network

(c) Data Link

(d) Physical

(e) All of these

7. Which of the following does NOT describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

8. Which of the following is TRUE ?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

9. A range check ________

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or ________ .a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct ________

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user's perspective

(d) The business practices and policies

(e) None of these

15. The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

16. Before a package can be used in a java program it must be ________ .

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ .

(a) begin the line with a # sign

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (- _ -)

(d) indent the line

(e) None of these

18. Programming language built into user programs such as Word and Excel are known as ________

(a) 4GLs

(b) macro languages

(c) object-oriented languages

(d) visual programming languages

(e) None of these

19. Firewalls are used to protect against ________ .

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are ________ .

(a) Schema, Base and Table

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client's request

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

23. Which of the following will NOT eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define supertypes

(e) None of these

24. The ________ directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

(c) Tiger team

(d) Serverless backup

(e) Logical unit

ANSWERS

1. (a), 2. (c), 3. (e), 4. (b), 5. (b)
6. (e), 7. (d), 8. (a), 9. (c), 10. (a)
11. (b), 12. (c), 13. (b), 14. (b), 15. (a)
16. (c), 17. (b), 18. (d), 19. (a), 20. (e)
21. (d), 22. (c), 23. (d), 24. (c), 25. (b)


Thursday, October 27, 2011

Operating System Multiple Choice Questions

Operating System Multiple Choice Questions (MCQ) And Answers
Objective Question On Operating Systemnce
(Computer Science &Engineering, IT, MCA Discipline)


1) Round robin scheduling is essentially the preemptive version of ________.
1 FIFO
2 Shortest job first
3 Shortes remaining
4 Longest time first
Right Ans ) 1

2) A page fault occurs
1 when the page is not in the memory
2 when the page is in the memory
3 when the process enters the blocked state
4 when the process is in the ready state
Right Ans ) 1

3) Which of the following will determine your choice of systems software for your computer ?
1 Is the applications software you want to use compatible with it ?
2 Is it expensive ?
3 Is it compatible with your hardware ?
4 Both 1 and 3
Right Ans ) 4

4) Let S and Q be two semaphores initialized to 1, where P0 and P1 processes the following statements wait(S);wait(Q); ---; signal(S);signal(Q) and wait(Q); wait(S);---;signal(Q);signal(S); respectively. The above situation depicts a _________ .
1 Semaphore
2 Deadlock
3 Signal
4 Interrupt
Right Ans ) 2

5) What is a shell ?
1 It is a hardware component
2 It is a command interpreter
3 It is a part in compiler
4 It is a tool in CPU scheduling
Right Ans ) 2

6) Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The main program is loaded into memory & is executed. This type of loading is called _________
1 Static loading
2 Dynamic loading
3 Dynamic linking
4 Overlays
Right Ans ) 3

7) In the blocked state
1 the processes waiting for I/O are found
2 the process which is running is found
3 the processes waiting for the processor are found
4 none of the above
Right Ans ) 1

8) What is the memory from 1K - 640K called ?
1 Extended Memory
2 Normal Memory
3 Low Memory
4 Conventional Memory
Right Ans ) 4

9) Virtual memory is __________.
1 An extremely large main memory
2 An extremely large secondary memory
3 An illusion of extremely large main memory
4 A type of memory used in super computers.
Right Ans ) 3

10) The process related to process control, file management, device management, information about system and communication that is requested by any higher level language can be performed by __________.
1 Editors
2 Compilers
3 System Call
4 Caching
Right Ans ) 3

11) If the Disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks requests are 98,37,14,124,65,67.
1 310
2 324
3 315
4 321
Right Ans ) 4

12) Multiprogramming systems ________.
1 Are easier to develop than single programming systems
2 Execute each job faster
3 Execute more jobs in the same time
4 Are used only on large main frame computers
Right Ans ) 3

13) Which is not the state of the process ?
1 Blocked
2 Running
3 Ready
4 Privileged
Right Ans ) 4

14) The solution to Critical Section Problem is : Mutual Exclusion, Progress and Bounded Waiting.
1 The statement is false
2 The statement is true.
3 The statement is contradictory.
4 None of the above
Right Ans ) 2

15) The problem of thrashing is effected scientifically by ________.
1 Program structure
2 Program size
3 Primary storage size
4 None of the above
Right Ans ) 1

16) The state of a process after it encounters an I/O instruction is __________.
1 Ready
2 Blocked/Waiting
3 Idle
4 Running
Right Ans ) 2

17) The number of processes completed per unit time is known as __________.
1 Output
2 Throughput
3 Efficiency
4 Capacity
Right Ans ) 2

18) _________ is the situation in which a process is waiting on another process,which is also waiting on another process ... which is waiting on the first process. None of the processes involved in this circular wait are making progress.
1 Deadlock
2 Starvation
3 Dormant
4 None of the above
Right Ans ) 1

19) Which of the following file name extension suggests that the file is Backup copy of another file ?
1 TXT
2 COM
3 BAS
4 BAK
Right Ans ) 4

20) Which technique was introduced because a single job could not keep both the CPU and the I/O devices busy?
1 Time-sharing
2 SPOOLing
3 Preemptive scheduling
4 Multiprogramming
Right Ans ) 4

21) A critical region
1 is a piece of code which only one process executes at a time
2 is a region prone to deadlock
3 is a piece of code which only a finite number of processes execute
4 is found only in Windows NT operation system
Right Ans ) 1

22) The mechanism that bring a page into memory only when it is needed is called _____________
1 Segmentation
2 Fragmentation
3 Demand Paging
4 Page Replacement
Right Ans ) 3

23) PCB =
1 Program Control Block
2 Process Control Block
3 Process Communication Block
4 None of the above
Right Ans ) 2

24) FIFO scheduling is ________.
1 Preemptive Scheduling
2 Non Preemptive Scheduling
3 Deadline Scheduling
4 Fair share scheduling
Right Ans ) 2

25) Switching the CPU to another Process requires to save state of the old process and loading new process state is called as __________.
1 Process Blocking
2 Context Switch
3 Time Sharing
4 None of the above
Right Ans ) 2

26) Which directory implementation is used in most Operating System?
1 Single level directory structure
2 Two level directory structure
3 Tree directory structure
4 Acyclic directory structure
Right Ans ) 3

27) The Banker¿s algorithm is used
1 to prevent deadlock in operating systems
2 to detect deadlock in operating systems
3 to rectify a deadlocked state
4 none of the above
Right Ans ) 1

28) A thread
1 is a lightweight process where the context switching is low
2 is a lightweight process where the context swithching is high
3 is used to speed up paging
4 none of the above
Right Ans ) 1

29) ______ is a high level abstraction over Semaphore.
1 Shared memory
2 Message passing
3 Monitor
4 Mutual exclusion
Right Ans ) 3

30) A tree sturctured file directory system
1 allows easy storage and retrieval of file names
2 is a much debated unecessary feature
3 is not essential when we have millions of files
4 none of the above
Right Ans ) 1

Tuesday, October 18, 2011

ISRO Computer Science Previous Year Question Paper

ISRO Computer Science Previous Year Question Paper


1. Which of the following features usually applies to data in a data warehouse?
(a) Data are often deleted
(b) Most applications consists of transactions
(c) Data are rarely deleted
(d) Relatively few records are processed by applications
(e) None of these


2. Which of the following is a transaction?
(a) A group of SQL statements consisting of one read and one write operation
(b) A group of SQL statements consisting only of ready operations.
(c) A group of SQL statements defining a user-oriented task
(d) A group of SQL statements consisting only of write operations.
(e) None of these


3. There are several security devices used to stop individuals from exploiting your system. Which of the following is used in conjunction with a firewall?
(a) Proxy server
(b) Intrusion- detection system
(c) Terminal server
(d) Web server
(e) None of these


4. The effect of the ROLLBACK command in a transaction is the following......
(a) Undo all changes to the data- base resulting from the execution of the transaction
(b) Undo the effects of the last UPDATE command
(c) Restore the content of the database to its state at the end of the previous day
(d) Make sure that all changes to the database are in effect
(e) None of these


5. A client / server network ..........
(a) has clients that provide functions such as application control and shared computation.
(b) uses client computers to provide copies of software to the server to allow server processing.
(c) provides a company with the capability to downsize from lager computer systems and move away from legacy systems.
(d) has server computers that perform all processing, clients are' dumb' input/ output devices only.
(e) None of these.


6. An applet is ....... Document application program.
(a) a static
(b) a dynamic
(c) an active
(d) a passive
(e) None of these


7. The local antenna for satellite connections is called a ........
(a) modem
(b) terminal
(c) VSAT
(d) DTA
(e) None of these


8. What are the four basis connecting hardware devices?
(a) Repeater, bridge, router and gateway
(b) Repeater, bridge, router and dell
(c) Repeater, connector, router and gateway
(d) Amplifier, bridge, router and gateway
(e) None of these


9. Which type of processing speed measurement is used primarily with supercomputers?
(a) Flops
(b) Fractions of second
(c) Gigahertz
(d) MIPS
(e) None of these


10. This type of software is designed for users who want to customize the programs they use.
(a) Shareware
(b) Open-source software
(c) Freeware
(d) Macros
(e) None of these


11. What is the term associated with the second part of an e-mail address?
(a) Local address
(b) Eight characters long
(c) User name
(d) Domain name
(e) None of these


12. A port that allows 8 bits at a time to be transmitted simultaneously is a (n) .....
(a) dedicated port
(b) parallel port
(c) SCSI port
(d) USB port
(e) None of these


13. In order for computers to communicate across a network, they must be connected through a(n).....
(a) TCP/IP
(b) Topology
(c) Ethernet
(d) Thin client
(e) None of these
(e) C. Rangarajan


14. What is a specialized software program that allows input and output devices to communicate with the rest of the computer system?
(a) Utility driver
(b) Utility program
(c) Data compression utility
(d) Device driver
(e) None of these


15. Single party disk relying on the disk controller for finding out which disk has failed is used by-
(a) RAID level 5
(b) RAID level 2
(c) RAID level 4
(d) RAID level 3
(e) RAID level 1


16. Which of these terms refers to the feature of an OS that allows a single computer to process the tasks of several users at different stations, in round-robin fashion?
(a) Multiprocessing
(b) Multiprogramming
(c) Multitasking
(d) Time processing
(e) Time-sharing


17. Which of the following statements is not true about two-tier client-server database architecture?
(a) SQL statements are processed on the server
(b) SQL statements may be processed on some of the clients
(c) Business logic is mostly processed on clients
(d) Business logic may be processed on the server
(e) None of these


18. A Relational operator that yields all values from selected attributes is known as a -
(a) difference
(b) product
(c) select
(d) project
(e) join


19. Normalization is:
(a) the process of creating small stable data structures from complex groups of data when designing a relational database
(b) a methodology for documenting database illustrating the relationship between various entities in the database
(c) an approach to data management that stores both data and the procedures acting on the data as object that can be automatically retrieved and shared
(d) a representation of data as they would appear to an application programmer or user
(e) a representation of data as they actually would be organized on physical storage media


20. The process of building a model that demonstrate the features of a proposed product, service or system is called a -
(a) JAD
(b) RAD
(c) templating
(d) prototyping
(e) TAD


21. Which of the following is mandatory component of a URL?
(a) Resource Path
(b) Protocol
(c) Port Number
(d) Domain Name
(e) None of these


22. DBMS allows you to extrapolate information from your data by using a-
(a) query language
(b) table generator
(c) report generator
(d) wizard
(e) None of these


23. A subschema is -
(a) a description of the physical and logical structure of data and the relationship among the data
(b) a file that identifies the subset of data that a group of users can access
(c) a detailed description of all data contained in the database
(d) a description of the types of modifications that users can make to a database
(e) Either (c) or (d)


24. Which of the following is not a type of hub?
(a) Passive hub
(b) Inactive hub
(c) Switching hub
(d) Intelligent hub
(e) None of these


25. The ........... lists the location of files on the disk
(a) FAT
(b) boot sector
(c) root folder
(d) data area
(e) None of these


Answers:
1. (b) 2. (a) 3. (a) 4. (a) 5. (b)
6. (b) 7. (e) 8. (a) 9. (a) 10. (a)
11. (d) 12. (b) 13. (b) 14. (d) 15. (d)
16. (e) 17. (c) 18. (d) 19. (a) 20. (d)
21. (e) 22. (a) 23. (e) 24. (b) 25. (a)

CDAC Previous Year Question Paper

CDAC Previous Year Question Paper



1.The programming language that was designed for specifying algorithm
Address
ASCII
ALGOL
None of these options


2. _____ contains the addresses of all the records according to the contents of the field designed as the record key.
Index<——ans
Subscript
Array
File


3. _________ symbol is used for Processing of data.
Oval
Parallelogram<——ans
Rectangle
Diamond


4. __________ is the analysis tool used for planning program logic
Protocol
None of these options
PROLOG
Pseudocode


5. Machine language has two part format the first part is__________ and the second part is __________
OPCODE,OPERAND<——ans
OPERAND,OPCODE
DATA CODE,OPERAND
OPERAND,CODEOP


6. Language Primarily used for internet-based applications
ADA
C++
JAVA;——ans
FORTRAN


7. _________ is a point at which the debugger stops during program execution and awaits a further command.
Memory Dump
Watch point<——ans
Break point
None of these options

8. ________do not contain any program logic and are ignored by the language Processor
Protocol
Virus
Comment
None of these options


9. The component of data base management system is ________
Data definition Language
Data manipulation Language
Data definition Language and Data manipulation Language
None of these options


10. The quality of Algorithm is judged on the basis of_________
Time requirement
Memory Requirement
Accuracy of solution
All of these options<——ans


11. Advantages of using flow charts is
Effective Analysis
Efficient Coding
Time consuming
Effective Analysis and Efficient Coding<—–ans
Programming in C


12. The Real constants in C can be expressed in which of the following forms
Fractional form only
Exponential form only
ASCII form only
Both Fractional and Exponential forms<——ans


13. The program, which translates high-level program into its equivalent machine language program, is called
Transformer
Language processor
Converter
None of these options<——ans<!–[if !supportEmptyParas]–>


14. Consider the following statements. i.Multiplication associates left to right ii.Division associates left to right
iii.Unary Minus associates right to left
iv.subtraction associates left to right All are true <——ans
only i and ii are true
all are false
only iii and iv are true


15. What will be the value of variable a in the following code?
unsigned char a;
a = 0xFF + 1;
printf("%d", a);
0xFF
0×100
0 <——ans
0×0


16. What is the output of the following program?
#include <stdio.h>
void main()
{
printf("\n10!=9 : %5d",10!=9);
}
1<——ans
0
Error
None of these options

17. #include<stdio.h>
void main()
{
int x=10;
(x<0)?(int a =100):(int a =1000);
printf(" %d",a);
}
Error<——ans
1000
100
None of these options


18. Which of the following shows the correct hierarchy of arithmetic operations in C
(), **, * or /, + or –
(), **, *, /, +, –
(), **, /, *, +, –
(), / or *, – or + <—–Ans


19. What is the output of the following code?
#include<stdio.h>
void main()
{
int a=14;
a += 7;
a -= 5;
a *= 7;
printf("\n%d",a);
}
112<——ans
98
89
None of these options


20. What is the output of the following code? #include<stdio.h>
#define T t
void main()
{
char T = `T`;
printf("\n%c\t%c\n",T,t);
}
Error
T t
T T
t t